On Mon, Jul 24, 2017 at 02:27:16PM -0700, robg...@nospammail.net wrote:
> I'm getting Postfix setup to deal with "bad headers".
>
> Looks like there's a bunch of ways to do it.
>
> Three I'm looking at are
>
> 1) Postfix's built in headers check
> 2) A milter that'll check for & reject headers
>
Hi
On Mon, Jul 24, 2017, at 02:47 PM, Noel Jones wrote:
> Use whichever you like. For simple checks, the differences are
> probably not significant. For complex checks (eg. checking multiple
> conditions or whitelisting certain messages) you'll need to use a
> milter or amavisd.
Ok, I didn't ca
On 7/24/2017 4:27 PM, robg...@nospammail.net wrote:
> Hi
>
> I'm getting Postfix setup to deal with "bad headers".
>
> Looks like there's a bunch of ways to do it.
>
> Three I'm looking at are
>
> 1) Postfix's built in headers check
> 2) A milter that'll check for & reject headers
> 3) Amavisd'
Hi
I'm getting Postfix setup to deal with "bad headers".
Looks like there's a bunch of ways to do it.
Three I'm looking at are
1) Postfix's built in headers check
2) A milter that'll check for & reject headers
3) Amavisd's built in header handling
I can actually get all three to work pretty mu
On Mon, Jul 24, 2017 at 01:53:57PM -0400, Wietse Venema wrote:
> post...@xmas.de:
> > Hi,
> >
> > isn't it possible to enforce TLS outbound to an MX ?
>
> Sure there is.
>
> /etc/postfix/master.cf
> smtp-encrypt .. .. .. .. .. .. smtp -o smtp_tls_security_level=encrypt
>
> /etc/postfix/tran
post...@xmas.de:
> Hi,
>
> isn't it possible to enforce TLS outbound to an MX ?
Sure there is.
/etc/postfix/master.cf
smtp-encrypt .. .. .. .. .. .. smtp -o smtp_tls_security_level=encrypt
/etc/postfix/transport
example.com smtp-encrypt
/etc/postfix/main.cf
transport_maps = hash:/e
On 7/24/2017 12:12 PM, Scott Techlist wrote:
> Anyone have or know of a log parser/tool that includes postscreen logs? I
> don't think Jim's pflogsum includes any type of postscreen data.
>
> Would be nice to have some reporting that included how much I'm potentially
> preventing vs. processing.
On Mon, Jul 24, 2017 at 02:33:01PM +0200, post...@xmas.de wrote:
> isn't it possible to enforce TLS outbound to an MX ?
No, Postfix TLS policy is based on the locally (securely) determined
nexthop domain, not the remotely (insecurely in most cases, given
still sparse DNSSEC deployment) determmine
On 7/24/2017 7:33 AM, post...@xmas.de wrote:
> Hi,
>
> isn't it possible to enforce TLS outbound to an MX ?
> In the example below, if mx0.example.com isn't offering TLS the
> email is sent unencrypted !?
> Enforcing TLS to a domain ist working as expected.
>
> tls_policy:
> [mx0.example.com]
Anyone have or know of a log parser/tool that includes postscreen logs? I
don't think Jim's pflogsum includes any type of postscreen data.
Would be nice to have some reporting that included how much I'm potentially
preventing vs. processing.
Thanks, Scott
Dear anonymous,
On 07/24/17 14:33, post...@xmas.de wrote:
isn't it possible to enforce TLS outbound to an MX ?
In the example below, if mx0.example.com isn't offering TLS the email is
sent unencrypted !?
Enforcing TLS to a domain ist working as expected. >
tls_policy:
[mx0.example.com]
Hi,
isn't it possible to enforce TLS outbound to an MX ?
In the example below, if mx0.example.com isn't offering TLS the email is
sent unencrypted !?
Enforcing TLS to a domain ist working as expected.
tls_policy:
[mx0.example.com] encrypt
[4.3.2.1]encrypt
postfix-3.2.0
12 matches
Mail list logo